This commit is contained in:
m3tam3re 2023-03-28 12:03:26 +02:00
parent e220ebdae6
commit 0f12e5577a
9 changed files with 43 additions and 14 deletions

View File

@ -85,11 +85,11 @@
"utils": "utils_2"
},
"locked": {
"lastModified": 1678729503,
"narHash": "sha256-j+h4Bdqbe+qjzhxdhkRmVgSx2lxJ8HnKeYcAhhnd1zM=",
"lastModified": 1679992839,
"narHash": "sha256-q3mABQYZeIvznM4tjfcgN4pxI2uJ5HkPF47TZODlNdU=",
"owner": "nix-community",
"repo": "home-manager",
"rev": "24c1a6335e3da6a3ecf82f33ac50c2ad66aee346",
"rev": "deb2f59b5c1fd11bec00600517ba7f51984c3090",
"type": "github"
},
"original": {
@ -116,11 +116,11 @@
},
"nixpkgs-unstable": {
"locked": {
"lastModified": 1678654296,
"narHash": "sha256-aVfw3ThpY7vkUeF1rFy10NAkpKDS2imj3IakrzT0Occ=",
"lastModified": 1679865578,
"narHash": "sha256-sYQmxxqIYL3QFsRYjW0AufhGur8qWfwoOGPGHRJZlGc=",
"owner": "nixos",
"repo": "nixpkgs",
"rev": "5a1dc8acd977ff3dccd1328b7c4a6995429a656b",
"rev": "4361baa782dc3d3b35fd455a1adc370681d9187c",
"type": "github"
},
"original": {
@ -148,11 +148,11 @@
},
"nixpkgs_3": {
"locked": {
"lastModified": 1678703398,
"narHash": "sha256-Y1mW3dBsoWLHpYm+UIHb5VZ7rx024NNHaF16oZBx++o=",
"lastModified": 1679878071,
"narHash": "sha256-7U5sTaebhjtlTYQI+q1FrbS2YXAhEsbLIcqirQ/kXJk=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "67f26c1cfc5d5783628231e776a81c1ade623e0b",
"rev": "44302d48a0b26421d23ee375ade3e47f9aab21df",
"type": "github"
},
"original": {

View File

@ -76,6 +76,7 @@
epkgs.org-download
epkgs.org-gcal
epkgs.org-ql
epkgs.org-present
epkgs.org-roam
epkgs.org-roam-ui
epkgs.pass

View File

@ -43,11 +43,19 @@
mode = "770";
owner = "traefik";
};
minio-root-cred = {
file = ../../secrets/minio-root-cred.age;
mode = "770";
owner = "minio";
};
searx-environmentFile = {
file = ../../secrets/searx-environmentFile.age;
mode = "770";
owner = "searx";
};
wg-easy-environmentFile = {
file = ../../secrets/wg-easy-environmentFile.age;
mode = "770";

View File

@ -1,5 +0,0 @@
{
services.netbird = {
enable = true;
};
}

View File

@ -0,0 +1,9 @@
{ config, ... }: {
services.minio = {
enable = true;
region = "eu-central-1";
rootCredentialsFile = config.age.secrets.minio-root-cred.path;
dataDir = [ "/var/backup/s3" ];
};
}

View File

@ -11,4 +11,7 @@
systemd.services.n8n.environment = {
BILLBEE_API_KEY = config.age.secrets.billbee-api-key.path; # TODO env file for systemd service
};
systemd.services.traefik.serviceConfig = {
EnvironmentFile="${config.age.secrets.traefik-env.path}";
};
}

View File

@ -81,6 +81,8 @@
[{ url = "http://localhost:3012/"; }];
syncthing.loadBalancer.servers =
[{ url = "http://localhost:8384/"; }];
minio.loadBalancer.servers =
[{ url = "http://localhost:9000/"; }];
};
routers = {
api = {
@ -141,6 +143,15 @@
service = "matomo";
entrypoints = "websecure";
};
minio = {
rule = "Host(`s3.lanakk.com`)";
tls = {
certResolver = "godaddy";
domains = "s3.lanakk.com";
};
service = "matomo";
entrypoints = "websecure";
};
searx = {
rule = "Host(`search.lanakk.com`)";
tls = {

View File

@ -19,4 +19,6 @@ in {
"littlelink-m3tam3re-env.age".publicKeys = [ root ];
"traefik-env.age".publicKeys = [ root ];
"minio-root-cred.age".publicKeys = [ root ];
}

BIN
secrets/minio-root-cred.age Normal file

Binary file not shown.